Sciweavers

576 search results - page 55 / 116
» Uncertainty in Knowledge Provenance
Sort
View
CORR
2011
Springer
175views Education» more  CORR 2011»
13 years 1 months ago
Heuristic Algorithm for Interpretation of Non-Atomic Categorical Attributes in Similarity-based Fuzzy Databases - Scalability Ev
- In this work we are analyzing scalability of the heuristic algorithm we used in the past [1-4] to discover knowledge from multi-valued symbolic attributes in fuzzy databases. The...
M. Shahriar Hossain, Rafal A. Angryk
TEI
2009
ACM
115views Hardware» more  TEI 2009»
14 years 4 months ago
Fritzing: a tool for advancing electronic prototyping for designers
Today a growing community of DIY-practitioners, artists and designers are using microcontroller-based toolkits to express their concepts for digital artifacts by building them. Ho...
André Knörig, Reto Wettach, Jonathan C...
CCS
2006
ACM
14 years 1 months ago
Multi-signatures in the plain public-Key model and a general forking lemma
A multi-signature scheme enables a group of signers to produce a compact, joint signature on a common document, and has many potential uses. However, existing schemes impose key s...
Mihir Bellare, Gregory Neven
AO
2007
144views more  AO 2007»
13 years 10 months ago
Social acquisition of ontologies from communication processes
This work introduces a formal framework for the social acquisition of ontologies which are constructed dynamically from overhearing the possibly conflicting symbolic interaction o...
Matthias Nickles
SP
2008
IEEE
162views Security Privacy» more  SP 2008»
13 years 9 months ago
Fable: A Language for Enforcing User-defined Security Policies
This paper presents FABLE, a core formalism for a programming language in which programmers may specify security policies and reason that these policies are properly enforced. In ...
Nikhil Swamy, Brian J. Corcoran, Michael Hicks